全文获取类型
收费全文 | 20434篇 |
免费 | 356篇 |
国内免费 | 157篇 |
专业分类
电工技术 | 271篇 |
综合类 | 9篇 |
化学工业 | 2623篇 |
金属工艺 | 675篇 |
机械仪表 | 242篇 |
建筑科学 | 497篇 |
矿业工程 | 54篇 |
能源动力 | 344篇 |
轻工业 | 687篇 |
水利工程 | 124篇 |
石油天然气 | 115篇 |
无线电 | 968篇 |
一般工业技术 | 1925篇 |
冶金工业 | 1902篇 |
原子能技术 | 190篇 |
自动化技术 | 10321篇 |
出版年
2022年 | 130篇 |
2021年 | 163篇 |
2020年 | 130篇 |
2019年 | 139篇 |
2018年 | 176篇 |
2017年 | 165篇 |
2016年 | 204篇 |
2015年 | 181篇 |
2014年 | 469篇 |
2013年 | 904篇 |
2012年 | 1149篇 |
2011年 | 3553篇 |
2010年 | 1499篇 |
2009年 | 1404篇 |
2008年 | 1114篇 |
2007年 | 969篇 |
2006年 | 829篇 |
2005年 | 897篇 |
2004年 | 822篇 |
2003年 | 831篇 |
2002年 | 524篇 |
2001年 | 181篇 |
2000年 | 174篇 |
1999年 | 188篇 |
1998年 | 317篇 |
1997年 | 213篇 |
1996年 | 189篇 |
1995年 | 148篇 |
1994年 | 157篇 |
1993年 | 146篇 |
1992年 | 137篇 |
1991年 | 116篇 |
1990年 | 120篇 |
1989年 | 150篇 |
1988年 | 109篇 |
1987年 | 125篇 |
1986年 | 133篇 |
1985年 | 141篇 |
1984年 | 181篇 |
1983年 | 127篇 |
1982年 | 122篇 |
1981年 | 101篇 |
1980年 | 90篇 |
1979年 | 99篇 |
1978年 | 82篇 |
1977年 | 102篇 |
1976年 | 98篇 |
1975年 | 87篇 |
1974年 | 92篇 |
1973年 | 75篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
921.
P.P. Sahu Author Vitae Mahipal Singh Author Vitae 《Computers & Electrical Engineering》2009,35(1):218-226
In this paper, we have designed and realized multichannel direct sequence spread spectrum (DSSS) system using code phase shift keying (CPSK). In the transmitter, taking each bit from each channel, data word is made as a symbol for selecting PN sequence, which is modulated with frequency of 100 MHz as DSSS signals. At the receiver, the correlator, integrator and decoder are used for separation of the signal of respective channel after demodulation. Oscilloscope traces show that the transmitted signals are matched with the simulated signals at the receiver. The bit error rate (BER) variation with jamming signal is estimated by our proposed simulation model, matching well with experimental values of BER measured by BER meter. 相似文献
922.
Wael Saleh Author Vitae Author Vitae 《Computers & Electrical Engineering》2009,35(4):587-593
Microwave imaging for medical applications has been of interest for many years. A novel near-field microwave non-invasive testing and evaluation (NIT&E) technique utilizing tapered rectangular waveguide probes is presented for breast cancer detection. Near-field microwave NIT&E techniques can be a successful candidate for the detection of breast cancer because of their potential in dealing with materials of low conductivity (i.e. lossy dielectrics like the breast tissue). The physical basis for breast tumor detection with microwave imaging is the contrast in dielectric properties of normal and malignant breast tissues. A method adopting Fourier transform matching (FTM) technique and utilizing the reflection coefficient at the aperture of a tapered rectangular waveguide sensor radiating into a breast is described resulting in microwave images that indicate the presence of a tumor. These images demonstrate the feasibility of detecting breast tumors using this approach. 相似文献
923.
Dynamic SLAs management in service oriented environments 总被引:1,自引:0,他引:1
Giuseppe Di Modica Author Vitae Author Vitae Lorenzo Vita Author Vitae 《Journal of Systems and Software》2009,82(5):759-771
The increasing adoption of service oriented architectures across different administrative domains, forces service providers to use effective mechanisms and strategies of resource management in order for them to be able to guarantee the quality levels their customers demands during service provisioning. Service level agreements (SLA) are the most common mechanism used to establish agreements on the quality of a service (QoS) between a service provider and a service consumer. The WS-Agreement specification, developed by the Open Grid Forum, is a Web Service protocol to establish agreements on the QoS level to be guaranteed in the provision of a service. The committed agreement cannot be modified during service provision and is effective until all activities pertaining to it are finished or until one of the signing party decides to terminate it. In B2B scenarios where several service providers are involved in the composition of a service, and each of them plays both the parts of provider and customer, several one-to-one SLAs need to be signed. In such a rigid context the global QoS of the final service can be strongly affected by any violation on each single SLA. In order to prevent such violations, SLAs need to adapt to any possible needs that might come up during service provision. In this work we focus on the WS-Agreement specification and propose to enhance the flexibility of its approach. We integrate new functionality to the protocol that enable the parties of a WS-Agreement to re-negotiate and modify its terms during the service provision, and show how a typical scenario of service composition can benefit from our proposal. 相似文献
924.
Design of DL-based certificateless digital signatures 总被引:1,自引:0,他引:1
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. 相似文献
925.
Dynamic Web Service discovery architecture based on a novel peer based overlay network 总被引:1,自引:0,他引:1
S. Sioutas Author Vitae E. Sakkopoulos Author Vitae 《Journal of Systems and Software》2009,82(5):809-824
Service Oriented Computing and its most famous implementation technology Web Services (WS) are becoming an important enabler of networked business models. Discovery mechanisms are a critical factor to the overall utility of Web Services. So far, discovery mechanisms based on the UDDI standard rely on many centralized and area-specific directories, which poses information stress problems such as performance bottlenecks and fault tolerance. In this context, decentralized approaches based on Peer to Peer overlay networks have been proposed by many researchers as a solution. In this paper, we propose a new structured P2P overlay network infrastructure designed for Web Services Discovery. We present theoretical analysis backed up by experimental results, showing that the proposed solution outperforms popular decentralized infrastructures for web discovery, Chord (and some of its successors), BATON (and it’s successor) and Skip-Graphs. 相似文献
926.
927.
Navid Aghdaie Author Vitae Yuval Tamir Author Vitae 《Journal of Systems and Software》2009,82(1):131-143
The Web is increasingly used for critical applications and services. We present a client-transparent mechanism, called CoRAL, that provides high reliability and availability for Web service. CoRAL provides fault tolerance even for requests being processed at the time of server failure. The scheme does not require deterministic servers and can thus handle dynamic content. CoRAL actively replicates the TCP connection state while maintaining logs of HTTP requests and replies. In the event of a primary server failure, active client connections fail over to a spare, where their processing continues seamlessly. We describe key aspects of the design and implementation as well as several performance optimizations. Measurements of system overhead, failover performance, and preliminary validation using fault injection are presented. 相似文献
928.
929.
J. Cucurull Author Vitae R. Martí Author Vitae Author Vitae S. Robles Author Vitae Author Vitae 《Journal of Systems and Software》2009,82(12):1927-1940
The existence of heterogeneous mobile agent systems hinders the interoperability of mobile agents. Several solutions exist, but they are limited in some aspects. This article proposes a full interoperability solution, in the context of the IEEE-FIPA agent standards, composed of three parts. The first part is a simple language-independent agent interface that enables agents to visit locations with different types of middlewares. The second part is a set of design models for the middlewares to support agents developed for different programming languages and architectures. And the third part is a method based on agents with multiple codes and a common agent data encoding mechanism to enable interoperability between middlewares that do not support the same programming languages. Furthermore two agent interoperability implementations, and its corresponding performance comparison, carried out over the JADE and AgentScape agent middlewares are presented. 相似文献
930.
Juan Wang Author Vitae Dan Feng Author VitaeAuthor Vitae Chengtao Lu Author Vitae 《Journal of Systems and Software》2009,82(12):2004-2011
This paper proposes a novel distributed metadata management strategy to efficiently handle different metadata workloads. It can deliver high performance and scalable metadata service through four techniques, including directory conversion metadata, mimic hierarchical directory structure, flexible partition methods targeted different kinds of metadata of diverse characteristics, and the application of database to metadata backend. Using micro-benchmarks and a prototype system, we firstly demonstrate the performance superiority of our strategy compared to Lazy Hybrid, and then present the detailed performance results and analysis of our strategy on different MDS scales. 相似文献